Lucene search
Basic search
Lucene search
Search by product
Subscribe
K
Start 30-day trial
Database
Vendors
Products
Years
CVSS
Scanner
Agent Scanning
API Scanning
Manual Audit
Perimeter Scanner
Scanning
Projects
Email
Webhook
Plugins
Resources
Documents
Blog
Glossary
FAQ
Pricing
Contacts
About Us
Partners
Branding Guideline
SIGN IN
OracleLinux
ELSA-2020-5663
History
Apr 27, 2020 - 12:00 a.m.
Vulners
/
Oraclelinux
/
Unbreakable Enterprise kernel security update
Unbreakable Enterprise kernel security update
2020-04-27
00:00:00
linux.oracle.com
51
0.01 Low
EPSS
Percentile
83.4%
JSON
[5.4.17-2011.1.2]
ctf: discard CTF from the vDSO (Nick Alcock) [Orabug: 31194036]
[5.4.17-2011.1.1]
slcan: Don’t transmit uninitialized stack data in padding (Richard Palethorpe) [Orabug: 31136750] {CVE-2020-11494}
blktrace: Protect q->blk_trace with RCU (Jan Kara) [Orabug: 31123573] {CVE-2019-19768}
KVM: x86: clear stale x86_emulate_ctxt->intercept value (Vitaly Kuznetsov) [Orabug: 31118688]
perf/x86/amd: Add support for Large Increment per Cycle Events (Kim Phillips) [Orabug: 31104924]
perf/x86/amd: Constrain Large Increment per Cycle events (Kim Phillips) [Orabug: 31104924]
kvm/svm: PKU not currently supported (John Allen) [Orabug: 31104924]
KVM: SVM: Override default MMIO mask if memory encryption is enabled (Tom Lendacky) [Orabug: 31104924]
EDAC/amd64: Drop some family checks for newer systems (Yazen Ghannam) [Orabug: 31104924]
x86/amd_nb: Add Family 19h PCI IDs (Yazen Ghannam) [Orabug: 31104924]
EDAC/mce_amd: Always load on SMCA systems (Yazen Ghannam) [Orabug: 31104924]
x86/MCE/AMD, EDAC/mce_amd: Add new Load Store unit McaType (Yazen Ghannam) [Orabug: 31104924]
EDAC/amd64: Add family ops for Family 19h Models 00h-0Fh (Yazen Ghannam) [Orabug: 31104924]
EDAC/amd64: Check for memory before fully initializing an instance (Yazen Ghannam) [Orabug: 31104924]
EDAC/amd64: Use cached data when checking for ECC (Yazen Ghannam) [Orabug: 31104924]
EDAC/amd64: Save max number of controllers to family type (Yazen Ghannam) [Orabug: 31104924]
EDAC/amd64: Gather hardware information early (Yazen Ghannam) [Orabug: 31104924]
EDAC/amd64: Make struct amd64_family_type global (Yazen Ghannam) [Orabug: 31104924]
floppy: check FDC index for errors before assigning it (Linus Torvalds) [Orabug: 31067510] {CVE-2020-9383}
KVM: SVM: Guard against DEACTIVATE when performing WBINVD/DF_FLUSH (Tom Lendacky) [Orabug: 31012269]
KVM: SVM: Serialize access to the SEV ASID bitmap (Tom Lendacky) [Orabug: 31012269]
iommu/vt-d: Allow devices with RMRRs to use identity domain (Lu Baolu) [Orabug: 31127400]
[5.4.17-2011.1.0]
vhost: Check docket sk_family instead of call getname (Eugenio Perez) [Orabug: 31085989] {CVE-2020-10942}
selftests/net: add definition for SOL_DCCP to fix compilation errors for old libc (Alan Maguire) [Orabug: 31078892]
kernel: cpu.c: fix print typo about SMT status (Mihai Carabas) [Orabug: 31053334]
nfs: optimise readdir cache page invalidation (Dai Ngo) [Orabug: 31044292]
NFS: Directory page cache pages need to be locked when read (Trond Myklebust) [Orabug: 31044292]
rds: transport module should be auto loaded when transport is set (Rao Shoaib) [Orabug: 31032126]
efi: Fix a race and a buffer overflow while reading efivars via sysfs (Vladis Dronov) [Orabug: 31020408]
net: Support GRO/GSO fraglist chaining. (Steffen Klassert) [Orabug: 30670829]
net: Add fraglist GRO/GSO feature flags (Steffen Klassert) [Orabug: 30670829]
udp: Support UDP fraglist GRO/GSO. (Steffen Klassert) [Orabug: 30670829]
net: remove the check argument from __skb_gro_checksum_convert (Li RongQing) [Orabug: 30670829]
Revert ‘nvme_fc: add module to ops template to allow module references’ (John Donnelly) [Orabug: 31119387]
ext4: add cond_resched() to ext4_protect_reserved_inode (Shijie Luo) [Orabug: 31067112] {CVE-2020-8992}
dsa: disable module unloading for ARM64 (Allen Pais) [Orabug: 30456791]
bpf: Undo incorrect __reg_bound_offset32 handling (Daniel Borkmann) [Orabug: 31127385] {CVE-2020-8835}
bpf: Fix tnum constraints for 32-bit comparisons (Jann Horn) [Orabug: 31127385] {CVE-2020-8835}
Affected Package
OS
Version
Architecture
Package
Version
Filename
oracle linux
7
src
kernel-uek
< 5.4.17-2011.1.2.el7uek
kernel-uek-5.4.17-2011.1.2.el7uek.src.rpm
oracle linux
7
aarch64
kernel-uek
< 5.4.17-2011.1.2.el7uek
kernel-uek-5.4.17-2011.1.2.el7uek.aarch64.rpm
oracle linux
7
aarch64
kernel-uek-debug
< 5.4.17-2011.1.2.el7uek
kernel-uek-debug-5.4.17-2011.1.2.el7uek.aarch64.rpm
oracle linux
7
aarch64
kernel-uek-debug-devel
< 5.4.17-2011.1.2.el7uek
kernel-uek-debug-devel-5.4.17-2011.1.2.el7uek.aarch64.rpm
oracle linux
7
aarch64
kernel-uek-devel
< 5.4.17-2011.1.2.el7uek
kernel-uek-devel-5.4.17-2011.1.2.el7uek.aarch64.rpm
oracle linux
7
noarch
kernel-uek-doc
< 5.4.17-2011.1.2.el7uek
kernel-uek-doc-5.4.17-2011.1.2.el7uek.noarch.rpm
oracle linux
7
aarch64
kernel-uek-tools
< 5.4.17-2011.1.2.el7uek
kernel-uek-tools-5.4.17-2011.1.2.el7uek.aarch64.rpm
oracle linux
7
aarch64
kernel-uek-tools-libs
< 5.4.17-2011.1.2.el7uek
kernel-uek-tools-libs-5.4.17-2011.1.2.el7uek.aarch64.rpm
oracle linux
7
aarch64
perf
< 5.4.17-2011.1.2.el7uek
perf-5.4.17-2011.1.2.el7uek.aarch64.rpm
oracle linux
7
aarch64
python-perf
< 5.4.17-2011.1.2.el7uek
python-perf-5.4.17-2011.1.2.el7uek.aarch64.rpm
Rows per page:
10
1-10 of 29
1
Related
nessus 48
ubuntu 10
openvas 33
suse 2
prion 6
debiancve 6
cbl_mariner 4
redhatcve 7
cve 6
ubuntucve 6
cvelist 6
veracode 2
nvd 6
mageia 3
redhat 12
cloudfoundry 3
f5 3
symantec 1
ibm 1
hackerone 1
fedora 7
zdi 1
githubexploit 4
archlinux 4
osv 1
attackerkb 2
zdt 1
packetstorm 2
metasploit 1
oraclelinux 4
amazon 3
photon 2
slackware 1
nessus
nessus
48
Oracle Linux 7 / 8 : Unbreakable Enterprise kernel (ELSA-2020-5663)
2020-04-28 00:00:00
Ubuntu 18.04 LTS : Linux kernel vulnerabilities (USN-4344-1)
2020-04-29 00:00:00
Ubuntu 18.04 LTS : Linux kernel vulnerabilities (USN-4342-1)
2020-04-29 00:00:00
ubuntu
ubuntu
10
Linux kernel vulnerabilities
2020-04-28 00:00:00
Linux kernel vulnerabilities
2020-04-30 00:00:00
Kernel Live Patch Security Notice
2020-05-20 00:00:00
openvas
openvas
33
Ubuntu: Security Advisory (USN-4342-1)
2020-04-29 00:00:00
Ubuntu: Security Advisory (USN-4344-1)
2020-04-29 00:00:00
openSUSE: Security Advisory for the (openSUSE-SU-2020:0388-1)
2020-03-29 00:00:00
suse
suse
Security update for the Linux Kernel (important)
2020-03-27 00:00:00
Security update for the Linux Kernel (important)
2020-04-23 00:00:00
prion
prion
6
Code injection
2020-02-14 05:15:00
Design/Logic Flaw
2019-12-12 20:15:00
Design/Logic Flaw
2020-04-02 21:15:00
debiancve
debiancve
6
CVE-2020-8992
2020-02-14 05:15:13
CVE-2020-11494
2020-04-02 21:15:13
CVE-2019-19768
2019-12-12 20:15:17
cbl_mariner
cbl_mariner
4
CVE-2020-8992 affecting package kernel 5.4.91-6
2021-04-06 23:51:14
CVE-2020-11494 affecting package kernel 5.4.91-6
2021-04-06 23:51:14
CVE-2020-10942 affecting package kernel 5.4.91-6
2021-03-03 03:44:27
redhatcve
redhatcve
7
CVE-2020-8992
2020-03-30 08:14:01
CVE-2019-19768
2019-12-23 17:38:45
CVE-2020-10942
2020-03-26 19:44:38
cve
cve
6
CVE-2020-8992
2020-02-14 05:15:13
CVE-2020-10942
2020-03-24 22:15:12
CVE-2020-11494
2020-04-02 21:15:13
ubuntucve
ubuntucve
6
CVE-2020-8992
2020-02-14 00:00:00
CVE-2019-19768
2019-12-12 00:00:00
CVE-2020-8835
2020-03-30 00:00:00
cvelist
cvelist
6
CVE-2020-8992
2020-02-14 04:27:04
CVE-2019-19768
2019-12-12 19:38:59
CVE-2020-10942
2020-03-24 21:03:52
veracode
veracode
Denial Of Service (DoS)
2020-05-06 03:17:10
Denial Of Service (DoS)
2020-11-05 03:09:58
nvd
nvd
6
CVE-2020-8992
2020-02-14 05:15:13
CVE-2019-19768
2019-12-12 20:15:17
CVE-2020-10942
2020-03-24 22:15:12
mageia
mageia
Updated kernel-linus packages fix security vulnerabilities
2020-04-04 01:53:32
Updated kernel packages fix security vulnerabilities
2020-03-14 02:19:55
Updated kernel packages fix security vulnerabilities
2020-04-03 01:48:49
redhat
redhat
12
(RHSA-2020:1966) Important: kernel security update
2020-04-29 09:04:15
(RHSA-2020:2203) Important: kpatch-patch security update
2020-05-19 09:40:36
(RHSA-2020:2519) Important: kpatch-patch security update
2020-06-10 21:32:09
cloudfoundry
cloudfoundry
USN-4345-1: Linux kernel vulnerabilities | Cloud Foundry
2020-05-14 00:00:00
USN-4318-1: Linux kernel vulnerabilities | Cloud Foundry
2020-05-14 00:00:00
USN-4363-1: Linux kernel vulnerabilities | Cloud Foundry
2020-06-22 00:00:00
f5
f5
K21458044 : Linux kernel vulnerability CVE-2020-10942
2022-06-02 00:00:00
K18004724 : Linux kernel vulnerability CVE-2020-8835
2020-05-08 00:00:00
K68024700 : Linux kernel vulnerability CVE-2020-9383
2020-03-30 00:00:00
symantec
symantec
Linux Kernel CVE-2019-19768 Local Denial of Service Vulnerability
2019-12-12 00:00:00
ibm
ibm
Security Bulletin: Publicly disclosed vulnerability from Kernel affects IBM Netezza Host Management
2020-09-23 12:32:47
hackerone
hackerone
Internet Bug Bounty: CVE-2020-9383 Floppy OOB read
2020-06-05 11:12:27
fedora
fedora
7
[SECURITY] Fedora 31 Update: kernel-headers-5.5.15-200.fc31
2020-04-07 03:24:29
[SECURITY] Fedora 32 Update: kernel-5.6.2-300.fc32
2020-04-05 00:19:19
[SECURITY] Fedora 31 Update: kernel-tools-5.5.15-200.fc31
2020-04-07 03:24:29
zdi
zdi
(Pwn2Own) Linux Kernel eBPF Improper Input Validation Privilege Escalation Vulnerability
2020-03-31 00:00:00
githubexploit
githubexploit
4
Exploit for CVE-2020-8835
2020-09-16 19:38:43
Exploit for Out-of-bounds Read in Linux Linux Kernel
2020-10-18 03:17:58
Exploit for Improper Restriction of Operations within the Bounds of a Memory Buffer in Linux Linux Kernel
2020-11-09 11:58:34
archlinux
archlinux
4
[ASA-202004-3] linux-lts: privilege escalation
2020-04-01 00:00:00
[ASA-202004-2] linux-hardened: privilege escalation
2020-04-01 00:00:00
[ASA-202004-4] linux: privilege escalation
2020-04-01 00:00:00
osv
osv
CVE-2020-9383
2020-02-25 16:15:11
attackerkb
attackerkb
CVE-2020-8835
2020-03-30 00:00:00
CVE-2021-33909
2021-07-20 00:00:00
zdt
zdt
Linux eBPF ALU32 32-bit Invalid Bounds Tracking Local Privilege Escalation Exploit
2021-09-01 00:00:00
packetstorm
packetstorm
Linux eBPF ALU32 32-bit Invalid Bounds Tracking Local Privilege Escalation
2021-09-01 00:00:00
Sequoia: A Deep Root In Linux's Filesystem Layer
2021-07-21 00:00:00
metasploit
metasploit
Linux eBPF ALU32 32-bit Invalid Bounds Tracking LPE
2021-08-17 23:01:14
oraclelinux
oraclelinux
4
kernel security and bug fix update
2020-05-14 00:00:00
Unbreakable Enterprise kernel security update
2020-04-08 00:00:00
Unbreakable Enterprise kernel security update
2020-05-11 00:00:00
amazon
amazon
Important: kernel
2020-03-23 16:25:00
Medium: kernel
2020-04-20 19:25:00
Important: kernel
2020-03-23 16:25:00
photon
photon
Important Photon OS Security Update - PHSA-2020-0073
2020-03-27 00:00:00
Important Photon OS Security Update - PHSA-2020-3.0-0073
2020-03-27 00:00:00
slackware
slackware
[slackware-security] Slackware 14.2 kernel
2020-06-11 21:36:19
0.01 Low
EPSS
Percentile
83.4%
JSON
Related for ELSA-2020-5663
nessus
48
ubuntu
10
openvas
33
suse
2
prion
6
debiancve
6
cbl_mariner
4
redhatcve
7
cve
6
ubuntucve
6
cvelist
6
veracode
2
nvd
6
mageia
3
redhat
12
cloudfoundry
3
f5
3
symantec
1
ibm
1
hackerone
1
fedora
7
zdi
1
githubexploit
4
archlinux
4
osv
1
attackerkb
2
zdt
1
packetstorm
2
metasploit
1
oraclelinux
4
amazon
3
photon
2
slackware
1